Security Advisory
RSA BSAFE Crypto-C Micro Edition vulnerabilities (CVE-2019-3728 and CVE-2019-3733) and VanDyke VShell Server for Windows
Risk assessment: Medium-High (see below)
Posted: April 26, 2022
Description
The VanDyke VShell Server for Windows uses RSA BSAFE Crypto-C Micro Edition for cryptography.
(CVE-2019-3728) Versions of RSA BSAFE Crypto-C Micro Edition versions prior to 4.1.4 are vulnerable to a Buffer Over-read vulnerability when processing DSA signatures. A malicious remote user could potentially exploit this vulnerability to cause VShell to crash, leading to a denial of service. [High severity]
(CVE-2019-3733) Versions of RSA BSAFE Crypto-C Micro Edition prior to 4.1.4 are vulnerable to three Improper Clearing of Heap Memory Before Release vulnerabilities, also known as “Heap Inspection vulnerabilities”. A malicious remote user could potentially exploit this vulnerability to extract information leaving data at risk of exposure. [Medium severity]
Products Not Affected
- VShell 4.7 and newer versions for Windows
- VShell for macOS and Linux
Products Affected
- VShell 4.6.3 and earlier versions for Windows
Recommended Solution
Upgrade to VShell 4.7 or newer versions for Windows
Vulnerability Fix Downloads
Official Postings
https://nvd.nist.gov/vuln/detail/CVE-2019-3728
https://nvd.nist.gov/vuln/detail/CVE-2019-3733
Revision History
April 26, 2022 – Security Advisory Published